3 comments

  • kro1 hour ago
    The title is vague, my first thought was &quot;We already have MLKEM&quot;. Which is enough against passive attackers.<p>The article apparently is about the CA&#x2F;certs for authenticating the server, a part of HTTPS
  • utopiah5 hours ago
    FWIW if you want to tinker on the topic I recommend OQS <a href="https:&#x2F;&#x2F;github.com&#x2F;open-quantum-safe&#x2F;" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;open-quantum-safe&#x2F;</a> including Chromium, Apache, nginx, curl, etc. It&#x27;s quite fun to play with.
    • westurner12 minutes ago
      What are appropriate default parameters?<p>The mozilla SSL Config Generator doesn&#x27;t yet support PQ; it has Old, Intermediate, and Modern: <a href="https:&#x2F;&#x2F;ssl-config.mozilla.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ssl-config.mozilla.org&#x2F;</a><p>mozilla&#x2F;ssl-config-generator: <a href="https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;ssl-config-generator" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mozilla&#x2F;ssl-config-generator</a><p>&quot;Chrome switching to NIST-approved ML-KEM quantum encryption&quot; (2024) <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42265927">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42265927</a><p>&quot;ML-KEM Mythbusting&quot; (2025) <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46074381">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=46074381</a> re: AuthKEM
  • boutell3 hours ago
    The pivot to MTC is a big change in the infrastructure of https. I wish other browsers were at least mentioned in this blog post. I&#x27;m curious about the future of letsencrypt as well.
    • utopiah1 hour ago
      Discussed few weeks ago on <a href="https:&#x2F;&#x2F;community.letsencrypt.org&#x2F;t&#x2F;post-quantum-crypto-roadmap&#x2F;245173" rel="nofollow">https:&#x2F;&#x2F;community.letsencrypt.org&#x2F;t&#x2F;post-quantum-crypto-road...</a> specifically &quot;The path we&#x27;re more interested in is Merkle Tree Certificates, currently in design at the PLANTS working group at IETF. Chrome has indicated that they anticipate this to be their preferred approach to PQC. We&#x27;re following that very closely, and are likely to deploy MTCs if it looks like that design is going to be supported widely.&quot; according to Matthew McPherrin, Let&#x27;s Encrypt staff
      • westurner42 minutes ago
        There are also Merkle ladders.<p>What is the difference between a Merkle Tree Certificate and a Merkle Ladder?<p>Is this correct?:<p>Without Merkle Tree Certificates, the per keypress overhead for e.g. jupyter_server would be something like 3.3 KB due to the PQ signatures.